Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61602
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200809-07 (tiff)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200809-07.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200809-07.

Vulnerability Insight:
Multiple buffer underflow vulnerabilities in libTIFF may allow for the
remote execution of arbitrary code.

Solution:
All libTIFF users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/tiff-3.8.2-r4'

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-2327
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html
BugTraq ID: 30832
http://www.securityfocus.com/bid/30832
Bugtraq: 20080905 rPSA-2008-0268-1 libtiff (Google Search)
http://www.securityfocus.com/archive/1/496033/100/0/threaded
Bugtraq: 20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff (Google Search)
http://www.securityfocus.com/archive/1/497962/100/0/threaded
Cert/CC Advisory: TA08-260A
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Debian Security Information: DSA-1632 (Google Search)
http://www.debian.org/security/2008/dsa-1632
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html
http://security.gentoo.org/glsa/glsa-200809-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:184
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11489
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5514
http://www.redhat.com/support/errata/RHSA-2008-0847.html
http://www.redhat.com/support/errata/RHSA-2008-0848.html
http://www.redhat.com/support/errata/RHSA-2008-0863.html
http://www.securitytracker.com/id?1020750
http://secunia.com/advisories/31610
http://secunia.com/advisories/31623
http://secunia.com/advisories/31668
http://secunia.com/advisories/31670
http://secunia.com/advisories/31698
http://secunia.com/advisories/31838
http://secunia.com/advisories/31882
http://secunia.com/advisories/31982
http://secunia.com/advisories/32706
http://secunia.com/advisories/32756
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
http://www.ubuntu.com/usn/usn-639-1
http://www.vupen.com/english/advisories/2008/2438
http://www.vupen.com/english/advisories/2008/2584
http://www.vupen.com/english/advisories/2008/2776
http://www.vupen.com/english/advisories/2008/2971
http://www.vupen.com/english/advisories/2008/3107
http://www.vupen.com/english/advisories/2008/3232
http://www.vupen.com/english/advisories/2009/2143
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.